CN104364816A - Systems and methods for supporting regulatory requirements for the distribution of controlled and non-controlled items - Google Patents

Systems and methods for supporting regulatory requirements for the distribution of controlled and non-controlled items Download PDF

Info

Publication number
CN104364816A
CN104364816A CN201280060673.5A CN201280060673A CN104364816A CN 104364816 A CN104364816 A CN 104364816A CN 201280060673 A CN201280060673 A CN 201280060673A CN 104364816 A CN104364816 A CN 104364816A
Authority
CN
China
Prior art keywords
order
history
client
identifier
lot
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201280060673.5A
Other languages
Chinese (zh)
Other versions
CN104364816B (en
Inventor
迈克尔·弗拉纳根
本尼·德尔加多
谢莉尔·威尔森
罗希特·奥比雷
普瑞提·辛格
里沙·阿加沃尔
艾米·卡尼
安妮库马尔·梅农
哈马德·Z·穆罕默德
萨蒂什·梅农
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
United Parcel Service of America Inc
United Parcel Service Inc
Original Assignee
United Parcel Service of America Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by United Parcel Service of America Inc filed Critical United Parcel Service of America Inc
Publication of CN104364816A publication Critical patent/CN104364816A/en
Application granted granted Critical
Publication of CN104364816B publication Critical patent/CN104364816B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/22Social work or social welfare, e.g. community support activities or counselling services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0607Regulated
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • G06Q10/0832Special goods or special handling procedures, e.g. handling of hazardous or fragile goods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Child & Adolescent Psychology (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Primary Health Care (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Medical Treatment And Welfare Office Work (AREA)
  • Storage Device Security (AREA)

Abstract

Systems and methods for supporting regulatory requirements for the distribution of controlled and non-controlled items such as, for example, non-controlled prescriptions (Rx), medical devices, and controlled substances in countries such as the United States and Canada, are provided. The systems and methods incorporate a license verification module that is configured to perform license validation for a particular order placed for a controlled and/or non-controlled item. In certain embodiments, the license verification module compares order data to historically sorted data and if one or more discrepancies exist, validation is unsuccessful. The license verification module may further query a third party database for updated license information upon validation failure. The systems and methods further incorporate a suspicious order monitoring module that is configured to perform a plurality of checks on the order to identify the order as an "order of interest" that may be further investigated and deemed to be suspicious.

Description

For supporting the system and method to the regulatory requirements that control and non-regulated item are sold
Background of invention
Invention field
Numerous embodiments of the present invention relates generally to for supporting that described control and non-regulated item are such as non-control prescription (Rx), Medical Devices and controlled substance as the system and method for the countries such as America & Canada to the regulatory requirements that control and non-regulated item are sold.
the description of association area
In the U.S., the dealer of controlled substance needs to register through drug enforcement administration (DEA).Controlled substance is understood to have and use the medicine by U.S.'s controlled drug bill supervision or chemical substance, such as many prescription medicines and arcotic usually.According to federal regulations, registration dealer accurately must examine client's license, also design and running system must identify and report the suspicious order of controlled substance.Suspicious order can comprise unrestriced example, and such as unconventional quantity order, substance depart from the order of normal condition, the order etc. of unconventional frequency.Fail effectively to examine and to permit and the incidence making great efforts to reduce the approval of suspicious order may cause imposing a fine and/or losing the privilege of selling these materials.
In the past, drug distributor has founded the application of various independent operation, in order to examine license data and/or to identify suspicious order.For the latter, carry out in many cases simple, based on the calculating of threshold value.Such as, for every class controlled substance, a client can be assigned with monthly threshold value, if this client attempts sending the order exceeding this monthly threshold value, then this order is marked as suspicious.But this method sets a numerical value simply, this numerical value can not adjust along with customer mode change usually in time automatically.And this method does not consider other clients or the client of the identical type may placed an order to similar controlled substance.This system usually can not examine License Status when evaluating order dubiety simultaneously.Therefore, the license of client may be invalid, or from their threshold value determined before of more client's examples may be no longer accurate or outdated for a long time.
Therefore, need a kind of system and method for improvement for examining the license data of client and identifying the suspicious order of client, wherein this system and method mechanical check license data and on client widely and client's sample basis comparison History Order information.
General introduction
According to numerous embodiments of the present invention, the invention provides a kind of supervision and close rule system, for identifying and auditing the client's license data received because of supervision material order.This system comprises one or more memory storage region, and the storage data about one or more parameter are contained in this memory storage region, described parameter and multiple client supervise permit relevant; And one or more computer processor.This one or more computer processor is configured to: (A) receives the order of supervision material from client, this order comprises order data, and the client that this order data comprises the one or more parameters of one of them that the multiple clients about this client supervise in license inputs data; (B) the storage data be at least partially included in described one or more memory storage region are retrieved; (C) client is inputted data to compare with the part retrieved storing data, to identify one or more difference; (D) for not recognizing difference, for this order generates good authentication report, this good authentication report approval this order of process further; (E) for identifying one or more difference, for this order generates unsuccessful authentication report.
According to numerous embodiments of the present invention, provide a kind of method that computing machine performs, for the License Authentication of the order about one or more supervision materials.The numerous embodiments of described method comprises the following steps: (A) receives and store the order data relevant to the order of the supervision material that client sends in one or more memory storage region, and the client that this order data comprises about the one or more parameters of one of them in multiple client's licenses of this client inputs data; (B) go out from described one or more memory storage area reseach and store data at least partially, described storage packet supervises the relevant data of one or more parameters of license containing to multiple client; (C) by least one computer processor, client is inputted data to compare with the institute's retrieving portion storing data, to identify one or more difference; (D) for unidentified go out any difference, generated the good authentication report of this order by this at least one computer processor, this good authentication report approval further this order of process; (E) for identifying one or more difference, generated the unsuccessful authentication report of this order by this at least one computer processor, this unsuccessful authentication report stops this order of process further.
According to numerous embodiments of the present invention, the invention provides a kind of computer program, it comprises at least one computer-readable recording medium, and described medium has computer readable program code part wherein.This computer readable program code part comprises first can perform part, for receiving the data of the associated customer license received because of supervision material order; Second can perform part, inputs data and stores data at least partially for comparing client, to identify one or more difference; Part can be performed, for generating one or more reports based on described comparison with the 3rd.By first can the enforcement division packet that divides the associated customer of reception to permit containing the order data about the supervision material order sent by client, the client that this order data comprises about the one or more parameters of one of them in multiple clients' licenses of this client inputs data; With storage data, this storage packet contains the data of one or more parameters of supervising license about multiple client.3rd enforcement division can divide and be specifically configured to further: for unidentified go out any difference, generate the good authentication report of this order, this good authentication report approval this order of process further; For identifying one or more difference, generate the unsuccessful authentication report of this order, this unsuccessful authentication report stops this order of process further.
According to numerous embodiments of the present invention, the invention provides a kind of supervision and close rule system, for identifying the suspicious order of the supervision material received.This system comprises storer and one or more processor.This one or more processor is configured to: receive supervision material order from client, this order comprise lot-size, Order Date, identify this client client's identifier, identify the consumer type identifier of consumer type and identify the Object Classification symbol of this supervision material; From memory query History Order, described History Order comprises the history Object Classification symbol of this Object Classification of coupling symbol, and each History Order comprises history quantity, identifies the shipment date of dispatch date, identifies the history client identifier of the client placed an order and identifies the history consumer type identifier of consumer type; Order is checked; And for being marked as suspicious order, the information about this order being stored and is beneficial to further investigation in memory.The inspection being applied to order comprises: (1) determines whether lot-size is greater than the first upper limit controlling value, this first upper limit controlling value derives from the history quantity of the first subgroup History Order, this the first subgroup History Order comprises the History Order with the history client identifier of mating with client's identifier, and being greater than the first upper limit controlling value for lot-size, is suspicious by this hand marker; (2) Order Date of this order and the time period between the shipment date from the previous continuous History Order had in the History Order of the history client identifier of mating with client's identifier is calculated, determine whether lot-size is greater than the second upper limit controlling value, this second upper limit controlling value derives from the history quantity of this time period and the second subgroup History Order, this the second subgroup History Order comprises the History Order with the history client identifier of mating with client's identifier, and being greater than the second upper limit controlling value for lot-size, is suspicious by this hand marker; (3) determine whether lot-size is greater than first threshold, this first threshold derives from the history quantity of the 3rd subgroup History Order, the History Order of the 3rd subgroup comprises the History Order with the history consumer type identifier of mating with consumer type identifier, and being greater than this first threshold for lot-size, is suspicious by this hand marker; (4) determine whether lot-size is greater than Second Threshold, this Second Threshold derives from the history quantity of History Order, is greater than this Second Threshold for lot-size, is suspicious by this hand marker; And (5) determine whether lot-size is greater than the 3rd threshold value, 3rd threshold value derives from the history quantity of the History Order of the 4th subgroup, the History Order of the 4th subgroup comprises the History Order with history client and the customer-identifier mated with client and customer-identifier, being greater than the 3rd threshold value for lot-size, is suspicious by this hand marker.
According to numerous embodiments of the present invention, the invention provides a kind of method that computing machine performs, for identifying the suspicious order of received supervision material.Numerous embodiments of the present invention comprises the following steps: receive supervision material order from client, this order comprise lot-size, Order Date, identify this client client's identifier, identify the consumer type identifier of consumer type and identify the Object Classification symbol of this supervision material, from memory query History Order, described History Order comprises the history Object Classification symbol of this Object Classification of coupling symbol, and each History Order comprises history quantity, identifies the shipment date of dispatch date, identifies the history client identifier of the client placed an order and identifies the history consumer type identifier of consumer type, by computer installation, order is checked, described inspection comprises: whether (1) this computer installation determination lot-size is greater than the first upper limit controlling value, this first upper limit controlling value derives from the history quantity of the first subgroup History Order, this the first subgroup History Order comprises the History Order with the history client identifier of mating with client's identifier, and being greater than the first upper limit controlling value for lot-size, is suspicious by this hand marker, (2) this computer installation calculates the Order Date of this order and the time period between the shipment date from the previous continuous History Order had in the History Order of the history client identifier of mating with client's identifier, determine whether lot-size is greater than the second upper limit controlling value, this second upper limit controlling value derives from the history quantity of this time period and the second subgroup History Order, this the second subgroup History Order comprises the History Order with the history client identifier of mating with client's identifier, and the second upper limit controlling value is greater than for lot-size, be suspicious by this hand marker, (3) whether this computer installation determination lot-size is greater than first threshold, this first threshold derives from the history quantity of the 3rd subgroup History Order, the History Order of the 3rd subgroup comprises the History Order with the history consumer type identifier of mating with consumer type identifier, and being greater than this first threshold for lot-size, is suspicious by this hand marker, (4) whether this computer installation determination lot-size is greater than Second Threshold, and this Second Threshold derives from the history quantity of History Order, is greater than this Second Threshold for lot-size, is suspicious by this hand marker, and (5) determine whether lot-size is greater than the 3rd threshold value, 3rd threshold value derives from the history quantity of the History Order of the 4th subgroup, the History Order of the 4th subgroup comprises the History Order with history client and the customer-identifier mated with client and customer-identifier, being greater than the 3rd threshold value for lot-size, is suspicious by this hand marker, and order is marked as suspicious, stores about the information of this order is to investigate further in memory.
According to numerous embodiments of the present invention, the invention provides a kind of computer program, it comprises at least one computer-readable recording medium, and this medium has computer readable program code part wherein.This computer readable program code part comprises: first can perform part, for receiving supervision material order from client, this order comprise lot-size, Order Date, identify this client client's identifier, identify the consumer type identifier of consumer type and identify the Object Classification symbol of this supervision material; Second can perform part, be contained in the History Order of the history Object Classification symbol of Object Classification symbol coupling for inquiry packet, each History Order comprises history quantity, identifies the shipment date of dispatch date, identifies the history client identifier of the client placed an order and identifies the history consumer type identifier of consumer type; 3rd can perform part, for checking order, described inspection comprises: (1) determines whether lot-size is greater than the first upper limit controlling value, this first upper limit controlling value derives from the history quantity of the first subgroup History Order, this the first subgroup History Order comprises the History Order with the history client identifier of mating with client's identifier, and being greater than the first upper limit controlling value for lot-size, is suspicious by this hand marker; (2) Order Date of this order and the time period between the shipment date from the previous continuous History Order had in the History Order of the history client identifier of mating with client's identifier is calculated, determine whether lot-size is greater than the second upper limit controlling value, this second upper limit controlling value derives from the history quantity of this time period and the second subgroup History Order, this the second subgroup History Order comprises the History Order with the history client identifier of mating with client's identifier, and being greater than the second upper limit controlling value for lot-size, is suspicious by this hand marker; (3) determine whether lot-size is greater than first threshold, this first threshold derives from the history quantity of the 3rd subgroup History Order, the History Order of the 3rd subgroup comprises the History Order with the history consumer type identifier of mating with consumer type identifier, and being greater than this first threshold for lot-size, is suspicious by this hand marker; (4) determine whether lot-size is greater than Second Threshold, this Second Threshold derives from the history quantity of History Order, is greater than this Second Threshold for lot-size, is suspicious by this hand marker; And (5) determine whether lot-size is greater than the 3rd threshold value, 3rd threshold value derives from the history quantity of the History Order of the 4th subgroup, the History Order of the 4th subgroup comprises the History Order with history client and the customer-identifier mated with client and customer-identifier, being greater than the 3rd threshold value for lot-size, is suspicious by this hand marker; And the 4th can perform part, order is marked as suspicious, stores about the information of this order is to investigate further in memory.
Accompanying drawing is sketched
Description, these figure not necessarily are pressed actual size and are drawn.
Fig. 1 display can be used for the general view of the numerous embodiments of the system architecture putting into practice many aspects of the present invention.
Fig. 2 display is according to the illustrative diagram of the application server of numerous embodiments.
Fig. 3 display is according to the method flow of the License Authentication of numerous embodiments.
Fig. 4 display is according to the process flow diagram of the License Authentication module of numerous embodiments.
Fig. 5 display is according to the method flow of the suspicious order monitoring of numerous embodiments.
Fig. 6 provides an example of the user interface provided according to numerous embodiments.
Fig. 7 display is according to the process flow diagram of the exemplary suspicious order monitoring module of numerous embodiments.
Fig. 8 display is according to the process flow diagram carrying out the suspicious order monitoring module of Section 1 inspection of numerous embodiments.
Fig. 9 display is according to the process flow diagram carrying out the suspicious order monitoring module of Section 2 inspection of numerous embodiments.
Figure 10 display is according to the process flow diagram carrying out the suspicious order monitoring module of Section 3 inspection of numerous embodiments.
Figure 11 display is according to the process flow diagram carrying out the suspicious order monitoring module of Section 4 inspection of numerous embodiments.
Figure 12 display is according to the process flow diagram carrying out the suspicious order monitoring module of Section 5 inspection of numerous embodiments.
The detailed description of numerous embodiments
Numerous embodiments of the present invention is hereafter more completely describing with reference to accompanying drawing, and wherein (but not all) embodiment more of the present invention is shown in the accompanying drawings.In fact, these embodiments can be embodied in many different forms, and should not be construed as limited to the embodiment of setting forth herein; On the contrary, these embodiments provide be in order to make herein openly meet suitable legal requiremnt.Unless otherwise defined, otherwise all technology used herein and scientific terminology have the connotation usually known identical with understood connotation with one skilled in the art of the present invention.Unless otherwise stated, term as used herein " or " refer to alternative and associating.In the text, same numbers refers to similar elements.
I. method, instrument, system and computer program
As realized, embodiment can be implemented in every way, comprise in method, instrument, system or computer program implement.Therefore, it is the embodiment of hardware completely that embodiment can be, or can be the embodiment that wherein processor is programmed to carry out particular step.And numerous embodiments can be the computer program on computer-readable recording medium, this medium has computer-readable program instructions wherein.Any suitable computer-readable recording medium can be used, comprise hard disk, CD-ROM, optical storage or magnetic storage device.
Below with reference to the block scheme of method, instrument, system and computer program and process flow diagram, concrete embodiment is described.Should be understood that, each square in block scheme and process flow diagram partly can be implemented by computer program instructions respectively, such as, implement with the logic step that processor in computer systems, which performs or operation.These computer program instructions can be loaded on computing machine, such as special purpose computer or other programmable data process instrumentations, to produce by the machine of customized configuration, the instruction thus performed on this computing machine or other programmable data process instrumentations performs the function indicated in one or more flow process square.
These computer program instructions also can be stored in computer-readable memory, this storer can instruct computing machine or other programmable data process instrumentations to play function in a specific way, and the instruction be thus stored in computer-readable memory produces the goods comprising computer-readable instruction for performing the function indicated in one or more flow process square.This computer program instructions also can be loaded on computing machine or other programmable data process instrumentations thus cause producing the sequence of operations step will carried out on this computing machine or other programmable instruments, thus producing the process of computing machine execution, the instruction thus performed on computing machine or other programmable instruments is provided for the operation performing the function indicated in one or more flowchart block.
Therefore, block scheme and process flow diagram square support for carry out appointed function various combinations, for carry out appointed function operative combination and for carry out appointed function programmed instruction combination.Should be understood that, each square of block scheme and process flow diagram and the combinations of blocks of block scheme and process flow diagram are by being implemented based on the computer system of specific use hardware or the combination of specific use hardware and computer instruction, and this computer system performs the function or operation of specifying.
II. exemplary system architecture
Fig. 1 provides the supervision that can use in conjunction with numerous embodiments of the present invention and the diagram of closing rule (RCS) network infrastructure 100.According to numerous embodiments, RCS network infrastructure 100 can be associated with the manufacturer of control and/or non-regulated item and/or dealer, and described article are such as non-control prescription (Rx), Medical Devices and/or controlled substance.In other embodiments, RCS network infrastructure 100 can be relevant to the carrier being used for transporting these article by manufacturer and/or dealer.Such as, manufacturer can consult with carrier (such as nonrestrictive example, United Parcel Service company) with the storehouse mechanism being used as manufacturer and/or distribution body.In this particular case, carrier can store control and the/stock of non-regulated item of manufacturer, can receive order, can process order from client, and/or transport section stock completes order to this client.In other embodiments, carrier and manufacturer and/or dealer can the various responsibilities of shared, and now RCS network infrastructure 100 may be distributed in nature at least in part.
In FIG, RCS network infrastructure 100 can comprise many services, the service of such as network service, data manipulation and service and the order for the treatment of received control and/non-regulated item.In some embodiments, these services can be provided at RCS Internet contact framework 100 by the one or more subsystem being arranged in architecture 100.As nonrestrictive example, the RCS network infrastructure 100 shown in Fig. 1 comprises database service 101, storage medium 102, the webserver 104, order placement service (not shown) and application server 103.In numerous embodiments, database service 101 can comprise data base management system (DBMS), and storage medium 102 can comprise one or more database and one or more database instance.In numerous embodiments, storage medium 102 can be the medium of one or more types, such as hard disk, tape or flash memory.Term " database " refers to the structured set being such as stored record in computer systems, which or data via relational database, hierarchical data base or network data base.Such as, in one embodiment, storage medium 102 comprises at least one database, this database purchase about the historical information of order of the non-control that receives and transport and regulated item.
In numerous embodiments, the webserver 104 and application server 103 are configured to as various origin system 106 provides data, these origin systems may be wanted to obtain the various services in RCS network infrastructure 100, and/or send or check the order of non-control and regulated item, such as non-control prescription (Rx), Medical Devices and/or regulated item.In some embodiments, the webserver 104 and application server 103 also can be configured to into third party entity (such as, the framework that they are relevant and system) provide data with collection information, this third party entity is Shi Hegui management organization 109 such as.Such as, network service 104 can exchange data with origin system 106 and He Gui management organization.Therefore, in numerous embodiments, network service 104 comprises hardware, operating system, web server software, ICP/IP protocol and web site contents (webpage, image and alternative document).Therefore, such as, origin system 106 can obtain the data transmitted by network service 104, and can make request to architecture 100.And in numerous embodiments, the one or more webpage of user-accessible is to audit the information about order.
In the embodiment of the RCS network infrastructure 100 shown in Fig. 1, network service 104 communicates with origin system 106 via network 107 (such as the Internet).Origin system 106 can be connected with network service 104.And, as hereafter will explained in detail, network service 104 also can with other External system communication, the system 109 of such as third party He Gui management organization.
In addition, in numerous embodiments, network service 104 communicates with the computer installation 108 of RCS user via the network 105 (or via external network 107) in system 100.Be similar to origin system 106, the computer installation 108 (such as desktop PC, notebook computer or laptop computer, personal digital assistant (PDA), mobile phone or other treating apparatus) of user can utilize the browser of the computer installation 108 being positioned at user to be connected with network service 104.
And in numerous embodiments, application server 103 comprises for providing functional application in RCS network infrastructure 100.Such as, in one embodiment, application server 103 is made up of one or more server, and comprises supervision and close rule system (RCS) application.In this particular embodiment, RCS application provides the functional of the order examined license and identify suspicious control and/non-regulated item, such as non-control prescription (Rx), Medical Devices and/or regulated item.In addition, these service/service devices 101,103,104,110 and storage medium 102 can in RCS network infrastructure 100 electronic communication each other.Such as, these service/service devices 101,103,104,110 communicate by identical or different wireless or cable network 105 with storage medium 102, comprise such as wired or wireless PAN (Personal Area Network) (" PAN "), LAN (Local Area Network) (" LAN "), Metropolitan Area Network (MAN) (" MAN "), wide area network (" WAN "), the Internet etc.Finally, although Fig. 1 is with independent, that entity that is independent operation shows RCS network infrastructure 100 parts, the various embodiments of RCS Internet contact framework 100 are not limited to this certain architectures.
a. application server
Fig. 2 provides the schematic diagram of the application server of a part for the application service 103 that can be an embodiment of the invention.As can from this figure understand, in this embodiment, this application server comprises processor 205, and processor is via system interface or bus 261 and other element communication in application server.Processor 205 can be embodied in multiple different mode.Such as, processor 205 can be various treating apparatus, such as treatment element, microprocessor, coprocessor, controller or various other treating apparatus comprising integrated circuit, such as special IC (" ASIC "), field programmable gate array (" FPGA "), hardware accelerator etc.In an exemplary embodiment, processor 205 can be configured to perform the instruction stored in the storage device or the instruction otherwise can read by processor 205.Like this, no matter configured by hardware or software approach, or configured by their combination, after by corresponding configuration, processor 205 all can represent the entity that can carry out according to the embodiment of the present invention operating.Also comprise the display device/input media 264 for receiving and show data in the application server.This display device/input media 264 can be the keyboard or pointing device that are such as combined with monitor.Application server comprises storer 263 further, and it can comprise ROM (read-only memory) (" ROM ") 265 and random access memory (" RAM ") 267.The ROM265 of application server can be used to store the basic input/output (" BIOS ") 226 containing basic routine, and this basic routine is assisted information transfer to the different elements in application server.
In addition, in one embodiment, application server comprises at least one memory storage 268, such as hard disk drive, CD driver and/or CD drive, for storing information on multiple computer-readable medium.Memory storage 268 and relevant computer-readable medium thereof can provide non-volatile memories.Above computer computer-readable recording medium can be substituted by the computer-readable medium of other any types, such as embedded or Mobile multimedia storage card (" MMC "), secure digital (" SD ") storage card, memory stick, EEPROM (Electrically Erasable Programmable Read Only Memo) (" EEPROM "), flash memory, hard disk lamp.In addition, these memory storages 268 each are connected to system bus 261 by suitable interface.
And many programs application (such as, computer program instructions group) can be stored by various memory storage 268 and/or are stored in RAM267.This program application can comprise operating system 280 and RCS application 300.This application 200 can control in some of the operation of application server processor 205 and operating system 280 auxiliary time.And RCS application 200 can comprise one or more module for carrying out the specific operation relevant to application 200, even if it does not functionally need modularization.Such as, in certain embodiments, RCS application 200 comprises Permission verification (LV) module 300 and suspicious order monitoring (SOM) module 400.As will be described in more detail, LV module 300 examine containing control and/or non-regulated item inbound/whether departures transaction is effective license, the chemical substance registration that such as DEA registration, DEA enumerate, FDA registration and the license of national regulatory material, state license, Canadian controlled substance permit healthy office and/or the license of its precursor.SOM module 400 provides the function of the suspicious order detecting control and/or non-regulated item.
In one embodiment, in application server, also there is socket 274, for connecting various computational entity, such as network service 104, data, services 101, order placement service 110 and/or storage medium 102.As mentioned above, this communication can be carried out via identical or different wired or wireless network (or combination that is wired and wireless network).Such as, this communication can utilize wired data transfer agreement to perform, such as Fiber Distributed Data Interface (" FDDI "), digital subscriber line (" DSL "), Ethernet, asynchronous transfer mode (" ATM "), frame relay, data over cable service interface specifications (docs is) (" DOCSIS ") or any other wired data.Similarly, application server can be configured to communicate via wireless external communication network, any one in this Web vector graphic various protocols, such as 802.11, GPRS (General Packet Radio Service) (" GPRS "), Wideband Code Division Multiple Access (WCDMA) access (" W-CDMA ") or any other wireless protocols.
It is to be appreciated that one or more parts of application server can be positioned at the position away from other application server parts.And one or more parts may be combined, the miscellaneous part performing function described herein also can be included in the application server.
b. more exemplary system components
Database service 101, order placement service 110 and network service 104 be each all can be comprised and be similar to the parts of application service 103 and the parts of function and function.Such as, in one embodiment, these entities each can comprise: (1) is through the processor of system interface or bus and other element communication; (2) display device/input media; (3) storer, comprises ROM and RAM; (4) memory storage; (5) network interface.Therefore, these frameworks are only exemplary purpose and provide, the restriction not to various embodiment.Term " calculation element " and " computer installation " be generally used to refer to act as what computing facillities, desktop PC, notebook computer or kneetop computer, distributed system, server, gateway, switch or other be used for performing the treating apparatus of described function.
III. exemplary system operation
As mentioned above, numerous embodiments of the present invention provides system and method, for examine containing control and/or non-regulated item inbound/whether departures transaction is effective license, and for identifying the suspicious order of control and/non-regulated item.Refer now to Fig. 3-5 and 7-12, which illustrates the operation and process that are produced by these numerous embodiments.Such as, Fig. 3 provides the treatment scheme of the License Authentication according to an embodiment of the invention.Fig. 4 provides and carries out the process flow diagram of Permission verification (LV) module 300 of License Authentication to the specific indent of control and/non-regulated item.Fig. 5 provides and determines whether this order should be identified as the process flow diagram of suspicious suspicious order monitoring (SOM) module 400 to the order inspection of control and/or non-regulated item.That is, in numerous embodiments, SOM module 400 pairs of orders check to be identified as by order " order interested ", and it can be investigated further or be considered as suspicious.Fig. 7-12 provides the more details of the operation about SOM module.RCS application 200 and respond module 300,400 will hereafter describe in further detail.
a.LV module
As previously mentioned, in numerous embodiments, RCS application 200 can comprise LV module 300.Fig. 3 provides the treatment scheme of the License Info examining the inbound transport point need sending departures shipping order or receive specific control and/or non-regulated item.In this object lesson, the order of dealer's receiving control or non-regulated item, such as non-control prescription (Rx), Medical Devices and/or controlled substance.Such as, in one embodiment, the architecture 100 of dealer directly communicates with origin system 106.Such as, client can send Email to dealer, or Consumer System 106 and dealer's architecture 100 can exchange information via electronic data interchange (EDI) by closed network.
In another embodiment, client can input order on website.In this particular embodiment, client is by the Internet 107 access websites and by one or more webpage input order.That is, in numerous embodiments, the webserver 104 being positioned at the architecture 100 of dealer provides interface (such as one or more webpage), and this interface is configured to the order allowing client's import control and/or non-regulated item.
According to embodiment, the client sending this order can provide some information.Such as, client can provide the identifier of control and/or non-regulated item, and such as medicine performs management board (DEA) Drug Code, and identifies the information of the license that client has, this permission its purchase control and/or non-regulated item.Client can provide the identifier identifying this client, such as client's DEA identifier.And client can provide the lot-size of control and/or non-regulated item, send the date of this order and other relevant informations (such as client sends address).Those skilled in the art can be to client several the information that order provides according to content expectation disclosed by the invention.
Therefore, order is received by the order placement service 110 of dealer, and order placement service 110 starts to process this order to realize fulfiling.In numerous embodiments, processing this order with the part realizing fulfiling is engage RCS application 200.Therefore, with reference to figure 3, order placement service 110 sends to RCS application 200 and closes rule inspection 1.Close rule inspection 1 and can comprise multiple sequence information, thus RCS application 200 can examine the License Info relevant to this order.Therefore, in this example, LV module 300 is called in RCS application 200.Responsively, LV module 300 can apply multiple rule to carry out Permission verification.Such as, in certain embodiments, LV module 300 can carry out one or more inspection, such as force the inspection of item, the inspection of effective stale data, the inspection of grace period during license expiration, and/or name or Business Name when permitting effective, state and country inspection.If the one or more inspection in Permission verification is not passed through, RCS application 200 to send a message back 2b to order placement service 110, shows unsanctioned reason.If Permission verification does not pass through, RCS application 200 sends a message back 2a, shows that the license of this order is successfully verified.
In unsanctioned embodiment, RCS apply 200 (LV modules 300) can seek He Gui management organization 6 obtain upgrade License Info (if any).If do not have the information upgraded, RCS application 200 can send the warning 3a of this specific license to file management.Subsequently, file management manually upgrades the License Info in RCS application 200.After License Info is updated, RCS application can send warning 3c to customer service, and customer service can send information 4 to order placement service 110, to continue the order workflow journey of this order.
In numerous embodiments, information can via RCS apply 200 for Permission verification object but each provenance upgrade or load.Such as, in certain embodiments, RCS application 200 can receive batch data from He Gui management organization 109 and uploads 7, also can be passed through to receive batch data by the RCS 200 direct requests 6 of sending to He Gui management organization 109 through network service 104 of applying and upload 7.In addition, in certain embodiments, user can via one or more user interface 5 import admission information.And in certain embodiments, when order continues order workflow journey, order placement service 110 can apply the order status information 2c of 200 transmissions about specific indent to RCS.
In numerous embodiments, information can utilize different mechanisms to communicate.Such as, in certain embodiments, RCS application 200 can utilize warning or notice to communicate with customer service with file management.In addition, in certain embodiments, file management, customer service and user can use one or more interface and apply 200 and/or order placement service 110 exchange of information with RCS.Such as, in one embodiment, interface is provided with one or more form web page by the network service 104 of dealer.Those skilled in the art can disclosure according to the present invention anticipate can by other the various communication mechanisms used.
Refer now to Fig. 4, the figure illustrates the process flow diagram of the LV module 300 of an embodiment of the invention.When processor 205 performs the module 300 in the RAM storer 367 of server according to numerous embodiments, this process flow diagram may correspond to the step that the processor 205 in application server shown in Fig. 2 carries out.
It should be noted that LV module 300 can be configured to perform the function for Permission verification process in numerous embodiments, and support the correlation function needed for Permission verification process.Such as, in numerous embodiments, LV module 300 can be configured to perform the one or more of following item: add license, retrieval license, renewal license, search license, process Permission verification transaction request, search for Permission verification transaction request, obtain Permission verification transaction data and seek provider service.
In addition, in numerous embodiments, Permission verification process relate to inquiry License Info with examine relevant specific inbound/license of the transaction request that sets off.In certain embodiments, this information can be stored in one or more database, and this information can be safeguarded by multiple source and upgrade.Therefore, RCS application 200 can provide much different mechanism to be used for receiving, upgrading and safeguard License Info, such as Application Program Interface (API) and user interface.
With reference to figure 4, in step 301, LV module 300 receives the receipt/sequence information relevant to control and/or non-regulated item, such as non-control prescription (Rx), Medical Devices or controlled substance.As previously mentioned, receipt/sequence information may be received from the order placement service 110 of dealer and the information that can comprise is such as the identifier of article and identifies mandate that this client has it buys the information of the license of these article.This client also can provide the identifier and/or lot-size, the date of placing an order and other relevant informations (such as client sends address) that identify this client.
In step 302, LV module 300 verifies receipt/sequence information.That is, in certain embodiments, LV module 300 determines whether receipt/sequence information comprises the information of carrying out needed for Permission verification process.In step 303, if LV module 300 determines that this receipt/sequence information is invalid and/or incomplete, so LV module 300 sends this defect of information notification order placement service 110 to order placement service 110.If LV module 300 determines that receipt/sequence information is effective, LV module 300 verifies this license (as shown in step 304).This step can relate to the LV module 300 inquiry accounts information relevant with this specific consumers and have to examine this client the effective license carrying out buying.Such as, U.S.'s license type carried out needed for particular purchased can comprise DEA license, DEA enumerate chemical substance license, state license, national regulatory material license and/or FDA license.The license type that may require in foreign country (such as Canada) can comprise Canadian controlled substance and permit healthy office and/or Canadian healthy precursor license.Therefore, for specific indent, LV module 300 can be required to confirm that this client has the one or more effective license carrying out buying.Such as, in numerous embodiments, proof procedure is undertaken by the inspection one or more information relevant with specific license by LV module 300.Such as, in one embodiment, LV module can issue country, DEA inventory number and/or medicine waiting code according to permit number and type checking license expiration date, license date of issue, license.
As shown in a step 305, in certain embodiments, when License Authentication failure, LV module 300 checks to check the information that whether can obtain the renewal of this client from one or more external source.Such as, external source can comprise conjunction and regulates reason train of mechanism, DEA and/or national license department.Therefore, in certain embodiments, LV module 300 is configured to from these source real-time collecting License Infos.
Within step 306, if the license upgraded (or the client substituted) information can obtain from one or more external source, so LV module 300 receives License Info from this external source.Such as, in one embodiment, LV module 300 is regulated reason train of mechanism to conjunction and is sent network service request, and request obtains the License Info of renewal of the client of this order of input, and closes and regulate reason train of mechanism beams back renewal to LV module 300 information through network service.But this is LV module 300 and/or the available only communication means of external source not.Such as, in certain embodiments, LV module 300 and external source can be configured to carry out electronic data interchange (EDI) by the Internet.Those skilled in the art's disclosure according to the present invention is contemplated to the multiple method that can be used to exchange information.
In step 307, LV module 300 determines whether external source provides the License Info of renewal.If no, LV module 300 records this failure, and thus this information can be used to historical information object.In addition, in certain embodiments, LV module sends one or more communication information to report the authentication failed that this purchase is permitted to each side.Such as, in a particular implementation, LV module 300 sends communication to the order placement service 110 of dealer.Therefore, order placement service 110 interruptible price process Order Fulfillment.In addition, order placement service 110 can send communication to client and inform that the purchase license needed for this client can not be verified.Therefore, in certain embodiments, while being processed at order, transporting and/or cancelling, client can be provided order status lastest imformation in real time.In some cases, client also can be provided the concrete reason that why required license fails to be verified.Therefore, under specific circumstances, client can take correct behavior based on the concrete reason about current order and/or follow-up order.Such as, one or more webpages that client can utilize the network service 104 of dealer to provide provide the License Info of renewal, and thus current order can be processed.(in numerous embodiments, the communication of the identical type about suspicious order analyzing can be provided to client).In addition, in certain embodiments, LV module 300 can send communication about this failure, such as file management and/or customer service to other colonies one or more and/or system.
On the other hand, as depicted at step 309, if receive the License Info of renewal, LV module 300 updates stored in the License Info in the system architecture 100 of dealer.Therefore, in a particular implementation, LV module 300 upgrades the accounts information of the specific consumers stored.In numerous embodiments, be the processing time that multiple client's storing authorization information helps to increase checking license in inside, because LV module 300 does not need for each single examining received is asked at external inquiry License Info.And it should be noted that in specific embodiment, dealer receives the volume licensing information of many clients termly, and thus the internal information of dealer can regular update.Such as, dealer can receive batch updating data based on predetermined basis from He Gui management organization 109.
After License Info is updated, in the step 310, LV module uses the information upgraded again to verify this license.Therefore, in specific embodiment, the similarity of this step and origin authentication is that LV module 300 applies the same rule applied with origin authentication.As indicated at 311, if the license needed for buying is verified, LV module 300 records the information about the receipt/order by checking.In addition, in numerous embodiments, LV module 300 sends communication to order placement service 110, and the license needed for report purchase is verified.Therefore, order placement service 110 continues this Order Fulfillment of process.As depicted in step 308, if LV module 300 still can not verify this license based on the License Info obtained from He Gui management organization, LV module 300 records this failure and sends suitable communication to proper object.
b.SOM module
As previously mentioned, in numerous embodiments, RCS application 200 also can comprise SOM module 400.Fig. 5 provides and determines whether specific indent is thought of as suspicious exemplary process flow.This flow process can be carried out specific indent on the basis of above-mentioned License Authentication process or as to substituting of above-mentioned License Authentication process.In the embodiment at least described in Fig. 5, the order of order placement service 110 receiving control and/or non-regulated item, such as non-control prescription (Rx) or controlled substance, and send the inspection 1 of conjunction rule to RCS application 200.According to some embodiment, the client placed an order can provide several information.Such as, be similar to License Authentication process, request can provide much different information, the identifier of such as these article, the information identifying this client, lot-size, order date issued and other relevant informations (such as client sends address).Responsively, according to these and other embodiment, RCS application 200 can be configured to call SOM module 400 by the expected, and this will be described in more detail below.
Still with reference to figure 5, in specific embodiment, RCS application 200 can be configured to send information 2a to order placement service 110, shows that SOM analyzes and is activated.Now, RCS applies 200 (such as SOM modules 400) and can be configured to carry out multiple inspection to order relevant information, suspicious to determine whether this order should be identified as.Once analyze, RCS application 200 has played information 4b to order placement service 110, show this order be be identified as suspicious.And RCS application 200 sends one or more alert/notification 3a based on analytical structure to quality assurance (QA)/supervision affairs (RA).Responsively, the renewable 3b order status of QA/RA and points for attention, the structure of display analysis.Finally, QA/RA also can send information 4a to order placement service 110, shows whether order placement service 110 should continue order flow process to the next item down task in flow process to complete order.In certain embodiments, when order is further processed, order placement service 110 can be applied 200 transmissions to RCS and upgrade 5.
As previously mentioned, in numerous embodiments, RCS application 200 also comprises suspicious order monitoring (SOM) module 400.This module 400 is responsible for providing the function that performs suspicious order monitoring analysis process and is supported the correlation function needed for this process, and such as SOM analysis, replacement analysis state, manually SOM are analyzed and SOM batch data via user interface loads.As previously mentioned, SOM module 400 can be configured to carry out one or more inspection to determine whether this order is suspicious to sequence information.Such as, according to numerous embodiments, SOM module is configured to: (1) contrasts the History Order pattern analysis client lot-size (such as, by checking certain drug code and concentration measurement unit (UOM)) of this client; (2) history contrasting this client places an order the lot-size of this client of frequency analysis and frequency (such as, by checking certain drug code and concentration measurement unit (UOM)); (3) all History Order contrasting the client of identical type analyze the lot-size of this client (such as, by checking certain drug code and concentration measurement unit (UOM)); (4) the past order history contrasting all types of all clients analyzes the lot-size of this client (such as, by checking certain drug code and concentration measurement unit (UOM)); And (5) history of contrasting the particular customer of this client places an order the lot-size (such as, by checking certain drug code and concentration measurement unit (UOM)) of this client of pattern analysis.In some embodiments, by application-specific may desired by, can with their any one array mode carry out these check in one or more.Each of these inspections all will hereafter describe in order in more detail.
Fig. 7 shows another exemplary process diagram of the SOM module 400 according to numerous embodiments.When processor 205 performs the module 400 in the RAM storer 267 of server according to numerous embodiments, this process flow diagram may correspond to the step that the processor 205 in application server shown in Fig. 2 carries out.Therefore, in step 412, SOM module 400 receives order and relevant information.In step 414, SOM module 400 inquire about before the historical information of order.In numerous embodiments, the historical information of order can by real-time storage before, because in some cases, dealer can send the controlled substance of specific indent in some day to client and may send at identical one day and/or receive another order of identical controlled substance.Therefore, historical information must be up-to-date, and thus accumulative lot-size is accurate.
Once SOM module 400 queried all information, SOM analyzes and namely starts (also seeing Fig. 5), thus in step 415 (see Fig. 7), Section 1 inspection implemented by SOM module 400 pairs of orders.As will be described in more detail, in numerous embodiments, Section 1 inspection comprises SOM module 400 and the lot-size history of this specific controlled substance of the lot-size of the order of this client received and this client is compared.If SOM module 400 determines that this order is not checked by Section 1, then SOM module 400 for this order is arranged suspicious order mark.As nonrestrictive example, if order is not checked by Section 1, suspicious order mark is set as " Y " by SOM module 400.
Similarly, at step 420 which, Section 2 inspection implemented by SOM module 400 pairs of orders.In numerous embodiments, Section 2 inspection comprise SOM module 400 by the lot-size of the order of this client that receives and identical controlled substance order last time by the number of days since deliver goods to this client compared with lot-size history and the number of days between this specific consumers and the order of controlled substance.Should be understood that, for different embodiment, this time period can calculate with not commensurate than a day.Such as, in other embodiments, SOM module 400 order that can compare identical controlled substance last time by the hourage since deliver goods to this client, the number of minutes or the moon number.
If SOM module 400 determines that this order is not checked by Section 2, then SOM module 400 sets suspicious order mark in the mode be similar to when this order is not checked by Section 1.In one embodiment, suspicious order mark identical when SOM module 400 setting checks with Section 1.But in another embodiment, SOM module 400 sets different suspicious order marks.In this particular embodiment, when SOM module 400 determines this order not by specific inspection, every inspection has independently suspicious order mark.Therefore, dealer can determine specific order not by which inspection from each suspicious order mark.
In step 425, SOM module 400 pairs of orders apply Section 3 inspection.In numerous embodiments, Section 3 inspection comprises SOM module 400 and the lot-size history of the lot-size of the order of this received client with the order of this controlled substance of the identical type client received is compared.In specific embodiment, the consumer type of client is registered by the DEA of this client and is identified.If SOM module 400 determines that this order is not checked by Section 3, then this module sets suspicious order mark.As previously mentioned, this suspicious order mark can be and checks identical mark with first and second, or this mark can be independently and only relevant to Section 3 inspection.
In step 430, SOM module 400 pairs of orders carry out Section 4 inspection.In numerous embodiments, Section 4 inspection comprises SOM module 400 and the lot-size history of any client of specific to the lot-size of the order of the client received and this controlled substance is compared.If SOM module 400 determines that this order is not checked by Section 4, this module sets suspicious order mark.As previously mentioned, this suspicious order mark can be identical with the mark that Section 1, Section 2, Section 3 check, or this mark can be independently and only relevant to Section 4 inspection.
In step 435, Section 5 inspection implemented by SOM module 400 pairs of orders.In numerous embodiments, Section 5 inspection comprises SOM module 400 and the lot-size of the order of this client received is compared about the lot-size history of particular customer with this client.Such as, SOM module 400 can be configured to inquire about retail customer order relative to the historical data of manufacturer A or the order of the doctor B historical data relative to the historical data of manufacturer C or the relative manufacturer P of the order of hospital F.Like this, the order of the manufacturer of multiple relative rotation will be got rid of, thus mainly focus on the historical data of the relative particular customer of client or drug manufacturer.If SOM module 400 determines that this order is not checked by Section 5, then this module sets suspicious order mark.As previously mentioned, this suspicious order mark can check identical mark with first, second, third, fourth, or this mark can be independently and only relevant to Section 5 inspection.
Once SOM module 400 has carried out Section 5 inspection, in step 440, to determine whether this order should be identified as suspicious for this module.In numerous embodiments, this comprises SOM module 400 and evaluates suspicious order mark.Therefore, in step 445, if SOM module 400 is determined, due to order, not to be set in unique mark or independent tag by specific inspection one or more, and so this module will represent that this order has been identified as suspicious information and has stored in memory.In step 450, according to numerous embodiments, the procedure ends that SOM module 400 performs.
In numerous embodiments, the information about order is only stored in the local storage in the application server 103 of Fig. 1 by SOM module 400, and Fig. 2 also so illustrates (such as, being stored in the memory storage 268 in RCS application 200).In another embodiment, information is stored in the storage medium of some type by SOM module 400, such as, the storage medium 102 shown in RCS network infrastructure 100 in Fig. 1.But in another embodiment, information is stored in the storage medium of some type of the outside being in RCS network infrastructure 100 by SOM module 400.
And according to numerous embodiments, the information that SOM module 400 stores can comprise dissimilar information.Such as, in one embodiment, SOM module 400 only stores suspicious order mark.And in another embodiment, as described below, SOM module 400 can be configured to the information storing the inspection that this module relevant except suspicious order mark is carried out.
It should be noted that in numerous embodiments, SOM module 400 determines after can being configured to carry out immediately preceding inspection that whether this order is not by this specific inspection.That is, in these particular implementation, SOM module 400 can be configured to determine whether this order is not checked by Section 1 immediately preceding after Section 1 inspection and before carrying out Section 2 inspection.If this order is not checked by Section 1, and this order has been identified as suspicious, then SOM module 400 can be configured to store about the information of this suspicious order, and does not carry out the inspection (such as Section 2, Section 3, Section 4 and Section 5 inspection) be left.SOM module 400 can be configured to same way and carry out Section 2, Section 3, Section 4 and Section 5 inspection.Therefore, in many embodiments, the comparable order of SOM module 400 whether by wherein one check that this module is all configured to carry out that all five situations about checking perform is faster.
Below describe in more detail SOM module 400 how according to numerous embodiments of the present invention carry out five check in each.These further details provide thus show that SOM module 400 is carried out these and checked better together with embodiment.Therefore, embodiment is only illustrative object and provides, and should not be interpreted as the restriction to scope of the present invention.In fact, the other detail about SOM module 400 function can be called in " system and method identifying suspicious order " U.S. Patent Application Publication No. 2011/0238593, and finds, and the full content of this application is incorporated into herein.
i. Section 1 inspection
As mentioned above, in numerous embodiments, it is suspicious to determine whether this order should be identified as that SOM module 400 is configured to implement Section 1 inspection to the order of the client received.In specific embodiment, this may need SOM module 400 lot-size of the order of the client received and this client to be compared for the lot-size history of this specific controlled substance.Correspondingly, Fig. 8 shows the process flow diagram 500 carrying out Section 1 inspection according to numerous embodiments SOM module 400.
As nonrestrictive example, client have input an order, orders the muscle relaxant Clonazepam (Clonazepam) of 400 (400) individual units.In this order, Clonazepam is identified with its DEA Drug Code 2737, and this client is identified with its DEA identifier ZZ12345678.And the Order Date of this order is on July 7th, 2009.
As previously mentioned, SOM module 400 receive information about this order and based on the one or more parameter queries identified in this sequence information about before the historical information of order.Such as, in this embodiment, SOM module 400 query history information is to retrieve the shipment number of total shipment amount and each dispatch date, and the record be wherein queried is 2737 (such as Clonazepams) based on the DEA code of every bar record and client's identifier is ZZ12345678.Therefore, SOM module 400 inquire-receive from this client and shipment to the lot-size history of the order of this client.
It should be noted that in certain embodiments, the measurement unit of quantity may be change on different order.Such as, the measurement unit of quantity can be each (EA), gram (GM) and/or milliliter (ML).Therefore, in these particular implementation, measurement unit also can be used as parameter when the record of query history information.
Once SOM module 400 queried historical information, this module carries out Section 1 inspection.In numerous embodiments, SOM module 400 can utilize one or more control table to check (such as, data are associated with control table) to carry out this.Control table is the instrument used during statistical magnitude controls, and whether it is used for deterministic process and operates in specified scope, or whether " in the controlling ".In this case, be normal when " in the controlling " refers to that lot-size is compared with past order.In certain embodiments, SOM module 400 is configured to draw quantity ordered curve according to Order Date, and uses exponentially weighted moving average (EWMA) (EWMA) chart to determine whether this lot-size is positioned at fiducial limit based on past lot-size.In these particular implementation, use EWMA chart to be because this chart is applicable to the little and progressive change of lot-size, but also identify large and change fast.
And, in numerous embodiments, before SOM module 400 produces EWMA control diagram, define two parameters.First parameter is undated parameter.In numerous embodiments, this parameter is set to the value between zero (0) to (1), and represents EWMA how much proportion given before currency how much proportion and imparting.Value the closer to one (1) makes algorithm that more proportion is partial to current lot-size, and gives the proportion that comparatively early order is less, makes EWMA adapt to more quickly change.In specific embodiment, use the default value of 0.4.
Second parameter is Sigma's multiplier (sigma multiplier) of upper control limit value.The confidence level of this state modulator sudden change.The default value of 3.0 represents that the setting of control limit makes to follow the lot-size of 99.7% of normal distribution all in limit value.Reduce this value and percentage can be down to 95% to 1.96.Therefore, in numerous embodiments, the result reducing this value finds more " false positive ", and higher sigma value may miss suspicious order.
Therefore, in numerous embodiments, as shown in step 505, SOM module 400 calculates EWMA chart based on history lot-size and the lot-size of this order of this client received.In specific embodiment, EWMA chart is by the sequence of shipment date.In addition, in specific embodiment, SOM module 400 calculates standard deviation and determines the upper control limit value (UCL) of EWMA chart.
Therefore, in step 510, the EWMA value of the lot-size of this order of this client received compares with upper control limit value by SOM module 400.In step 515, SOM module 400 determines whether the EWMA value of this lot-size is greater than this upper control limit value.As indicated in step 520, if SOM module 400 determines that the EWMA value of this lot-size is greater than this upper control limit value, SOM module 400 is suspicious order mark for this order sets.
Therefore, for this embodiment, the EWMA chart of the lot-size of this order of this client that SOM module 400 calculates history order for purchase and receives, and determine that the upper control limit of this chart is 159.8 units.A nonrestrictive example chart can be called in " system and method identifying suspicious order " U.S. Patent application No. 2011/0238593, announced and finds, and as previously mentioned, its full content is incorporated into herein.
ii. Section 2 inspection
Further, in numerous embodiments, SOM module 400 is configured to implement Section 2 inspection to this order of this client received, suspicious to determine whether this order should be identified as.In specific embodiment, this may need SOM module 400 by the lot-size of this order of this client that receives and from shipment last time to the number of days since the order of the identical controlled substance of this client, and lot-size history and this specific consumers, specific controlled substance order between number of days compare.Correspondingly, Fig. 9 shows, and according to numerous embodiments, SOM module 400 carries out the process flow diagram 600 of Section 2 inspection.
In numerous embodiments, SOM module 400 has been considered the time period (such as number of days) since order shipment last time of this controlled substance, and last time order lot-size, take into account, to determine common order rate, subsequently this order and this order rate are compared.Such as, in one embodiment, SOM module 400 uses equation Q=D*N to define lines, and the supply order of this controlled substance received from this client should close to these lines.(in equation Q=D*N, Q is supply lot-size, and D is average shipment every day rate (such as, average every day shipping Qty.), and N has been the time period (such as number of days) since supply last time order sends).Utilize this equation, in many embodiments, along with the time period between order becomes large, variability also increases in expection.Therefore, the upper control limit value based on the control diagram of this equation changes along with quantity and time variations.
Therefore, in step 605, SOM module 400 based on inquire about this received client this controlled substance before order historical information calculate control diagram.Such as, in a specific embodiment, control diagram comprise the time period between continuous order x-axis (number of days such as continuously between order) and every day shipping Qty. y-axis.A nonrestrictive example chart can be called in " system and method identifying suspicious order " U.S. Patent application No. 2011/0238593, announced and finds, and as previously mentioned, its full content is incorporated into herein.
And in step 610, SOM module 400 has calculated the time period since order shipment last time of this controlled substance of this client.As shown in step 615, the upper control limit value of lot-size to the corresponding time period on the x week of control diagram compares by SOM module 400 subsequently.In step 620, SOM module 400 determines whether this lot-size is greater than the upper control limit value corresponding to institute's section computing time.As shown in step 625, if SOM module 400 determines that this lot-size is greater than this upper control limit value, checking module 300 is suspicious order mark for this order sets.In act 630, according to numerous embodiments, the process of the applying Section 2 inspection performed by SOM module 400 terminates.
Therefore, for this embodiment, SOM module 400 calculates and has been had eight days from the previous order of Clonazepam by since shipment to this client.Therefore, SOM module 400 determines whether the lot-size of Clonazepam order is greater than this upper control limit value.Such as, if upper control limit value is calculated as 376 units, so the lot-size of these exemplary current 400 units is greater than this upper control limit value.Therefore, SOM module 400 for this order sets suspicious order mark.
iii. Section 3 inspection
As previously mentioned, in numerous embodiments, SOM module 400 is also configured to apply Section 3 inspection to this order of this client received, suspicious to determine whether this order should be identified as.In specific embodiment, this may need SOM module 400 the lot-size history of the lot-size of the order of this received client with the order of this controlled substance of received identical type client to be compared.Correspondingly, Figure 10 shows, and according to numerous embodiments, SOM module 400 carries out the process flow diagram 700 of Section 3 inspection.
As previously mentioned, in numerous embodiments, SOM module 400 inquires about the historical information of the order before of this controlled substance.And as previously mentioned, in numerous embodiments, query note can divide into groups by consumer type.In specific embodiment, consumer type can be the consumer type that DEA distributes.Therefore, in these particular implementation, SOM module 400 is from search records the historical information with identical controlled substance identifier and the consumer type identical with the client sending this order.That is, SOM module 400 search records (such as, the subset of query note) or SOM module 400 can directly can inquire about the historical information of these records from the original record inquired about from historical information.
In step 705, SOM module 400 comes into effect the process that Section 3 checks, by calculating threshold value based on the information of inquiry, and compares in the lot-size of the order of this received controlled substance.Such as, in numerous embodiments, threshold value is only set to the lot-size of received order by SOM module 400 must history lot-size percentage under it.Such as, this threshold value can be set as 95%, and therefore, lot-size must be positioned within the lot-size of the History Order of 95% of this controlled substance that is received and this consumer type that is shipment.But in other embodiments, SOM module 400 calculates this threshold value based on the probability Distribution Model of the history quantity utilizing this consumer type general or special.As nonrestrictive example, SOM module 400 can use normal distribution and set threshold value to percent 95 (such as, 2 standard deviations of mean value).
After calculating, in step 720, the lot-size of this order of this received client and this threshold value compare by SOM module 400.In a step 715, SOM module 400 determines whether this lot-size is greater than this threshold value.In step 720, if SOM module 400 determines that this lot-size is greater than this threshold value, SOM module 400 is suspicious order mark for this order is arranged.In step 725, according to numerous embodiments, the process of the applying Section 3 inspection that SOM module 400 performs terminates.
Therefore, for this embodiment, the consumer type of the client placed an order is " retail pharmacies ".SOM module 400 retrieve 459 consumer type be " retail pharmacies " and shipment to the record of the History Order of the controlled substance Clonazepam of client.It is 95% that SOM module 400 sets threshold value, evaluates the history lot-size of Clonazepam, and determines that the lot-size of 400 of the order of this received client is greater than the history lot-size of identical type client's 98%.Therefore, SOM module 400 for this order is arranged suspicious order mark.
iv. Section 4 inspection
And in numerous embodiments, SOM module 400 is configured to implement Section 4 inspection to this order of this received client, suspicious to determine whether this order should be identified as.In certain embodiments, this may need SOM module 400 the lot-size history of this specific controlled substance of the lot-size of this order of this received client and any client to be compared.Therefore, SOM module 400 carries out checking identical step with Section 3 substantially, but uses different a set of historical records retrieved.In this specific situation, the record retrieved is not defined as by SOM module 400 has identical consumer type with the client sending this order.SOM module 400 is retrieved as this controlled substance and sends the record with all History Order of shipment.Figure 11 shows, and according to numerous embodiments, SOM module 400 carries out the process flow diagram 800 of Section 4 inspection.
It is worth mentioning, be similar to Section 3 inspection, when carrying out Section 4 and checking, SOM module 400 arranges a threshold value (such as step 805) and determines whether the lot-size of this order of this client received is greater than this threshold value (such as step 810 and 815).In numerous embodiments, SOM module 400 utilizes and sets this threshold value about the similar mechanism described in Section 3 inspection above.Therefore, continue to get back to this nonrestrictive embodiment, SOM module 400 retrieve 3,917 receive and the historical record of Clonazepam order of shipment.It is 95% that SOM module 400 sets threshold value, evaluates the history lot-size of Clonazepam, and determines that the lot-size of 400 of the order of this received client is greater than the history lot-size of all clients' 86%.Therefore, SOM module 400 can not arrange suspicious order mark (such as step 820) for this order.In step 825, according to numerous embodiments, the process of the applying Section 4 inspection that SOM module 400 performs terminates.
v. Section 5 inspection
And in numerous embodiments, SOM module 400 is configured to implement Section 5 inspection to this order of this client received, suspicious to determine whether this order should be identified as.Figure 12 shows, and according to numerous embodiments, SOM module 400 carries out the process flow diagram 900 of Section 5 inspection.
In specific embodiment, implement Section 5 inspection SOM module 400 may be needed to arrange threshold value (such as step 905) and the lot-size history of the particular manufacturer about this specific controlled substance (that is, client) of the lot-size of this order of this client received and this client is compared (such as step 910).Therefore, SOM module 400 carries out the foregoing step substantially identical with Section 3 and Section 4 inspection substantially, but utilizes one group of different historical records retrieved.In this particular case, the record retrieved can not be limited to identical consumer type (as Section 3 inspection) or not limit completely (as Section 4 inspection) them by SOM module 400.On the contrary, Section 5 check in, SOM module 400 retrieve sent by specific consumers and all History Order of this controlled substance of being delivered by particular customer (i.e. manufacturer).
Be similar to Section 3 and Section 4 inspection, SOM module 400 sets a threshold value (such as step 905), then determine whether the lot-size of the order being received from this client is greater than this threshold value (such as step 915) in numerous embodiments, SOM module 400 utilizes and sets this threshold value about the similar mechanism described in Section 3 and Section 4 inspection above.Therefore, for this embodiment, what SOM module 400 retrieved some is received from client A and the historical record of order by the Clonazepam of manufacturer B shipment.SOM module 400 sets threshold value to 95%, evaluates the history lot-size of the Clonazepam relevant with manufacturer with this specific consumers, and this specific 400 the lot-size determining to be received from this client is higher than the history lot-size of 86%.Therefore, SOM module 400 can be this order and arranges suspicious order mark (such as step 920), and subsequently, in step 925, the process applying Section 5 inspection terminates.
III. exemplary interfaces
As previously mentioned, in numerous embodiments, can collect and the information of the various License Check stored about carried out and suspicious order analyzing.And in numerous embodiments, dealer can provide one or more user interface, for collecting and show the information of this storage.In specific embodiment, dealer also can provide one or more interface to allow to carry out what-if to the order of client before reception order, and allows client check analysis result, and preserves or abandon these results.
In specific embodiment, dealer can be client and provides and check all history Permission verification of this specific consumers and the function of suspicious order analyzing.In addition, this function can allow client (and other each side) to audit order behavior and other system behavior, such as, relate to the behavior of license data renewal, interpolation and/or delete and relate to the behavior carrying out what-if.Dealer may further be client and provides function of reporting about historical information and/or auditing result.These features are also convenient to initiatively to eliminate the obstacle and/or problem that may exist except having other interests, thus the situation of nullified license is minimized and/or make to be posthumously admitted as that to be identified as suspicious order minimized.
And in specific embodiment, dealer can perform security framework to regulate and control any one use of these interfaces and/or various modules described before.Such as, dealer's authority that can perform based role is to control user and upgrade License Info and/or to check and abandon the ability of carried out various analyses.Such as, the authority of this based role can comprise administrator role, it allows the user with this role to check the track (trail) whom adds, revises and/or delete license data about, and/or check role, it only allows the user with this role to check history Permission verification and/or suspicious sequence information.
And, in numerous embodiments, as previously mentioned, after there is particular event, for a side or can in many ways provide one or more notice.As unrestriced example, outside foregoing teachings, RCS application 200 can be configured to when Permission verification request is not passed through; When SOM analysis is not passed through; And/or recognize need this intragroup Party B or in many ways carry out manual SOM input time; Give notice to special group (that is, individual, company's (son) entity etc.).As commonly understood in the art, be contemplated to the combination that other configure and/or configure, whether each user for notice application and system when there is some event vetos in fact or other.As another nonrestrictive example, SOM module can be configured to notify user when all inspections carried out all successfully pass, thus forms the transaction through approval.
The further object lesson that can be provided at the interface in numerous embodiments comprises: (1) Permission verification web service interface, as the entrance that all License Infos carrying out order and receipt are examined; (2) suspicious order monitor network service interface, as the entrance of carrying out all SOM data analyses; (3) SOM analyzing responding interface, beams back response for the origin system (such as order placement service 110) checked the suspicious order analyzing of request, and is provided in details and the result of the SOM analysis that order carries out; (4) He Gui management organization (such as close and regulate reason train of mechanism) examines web service interface, is used as the entrance of the license data obtained for carrying out Permission verification; (5) He Gui management organization batch loads and files passe interface, uploads for allowing and uploads License Info file from He Gui management organization batch; (6) SOM files passe interface, uploads the analysis of batch SOM record for RCS application 200 for allowing user.A kind of unrestriced exemplary interfaces so as shown in Figure 6.
IV. conclusion
Based on the instruction provided in the accompanying drawing described before, one skilled in the art will realize that many changes of the present invention and other embodiments.Therefore, it being understood that the present invention is not limited to disclosed embodiment, other embodiments are also expected and are included within the scope of the appended claims.Although employ specific term in this article, they are only use in general and descriptive meaning, are not intended to limit.

Claims (25)

1. supervision and a conjunction rule system, for identifying and auditing the client's license data received because supervision material order, described system comprises:
One or more memory storage region, the storage data about one or more parameter are contained in described memory storage region, described parameter and multiple client supervise permit relevant; And
One or more computer processor, described one or more computer processor is configured to:
(A) receive the order of supervision material from client, this order comprises order data, and the client that this order data comprises the one or more parameters of one of them that the multiple clients about this client supervise in license inputs data;
(B) the storage data be at least partially included in described one or more memory storage region are retrieved;
(C) client is inputted data to compare with the part retrieved storing data, to identify one or more difference;
(D) for not recognizing difference, for described order generates good authentication report, the described good authentication report approval described order of process further; With
(E) for identifying one or more difference, for described order generates unsuccessful authentication report.
2. supervision according to claim 1 and close rule systems, wherein, for response identifies one or more difference, described one or more computer processor be further configured with:
The more new data of the storage data of asking the one or more parameters inputting client's license of data about described client to be correlated with;
For more new data described in reception, described client is inputted data and compare with described more new data, to determine whether described one or more difference still exists;
For not recognizing residual difference, for this order request generates the report of successful re-examination card; And
For recognizing one or more residual difference, for this order request generates the report of unsuccessful re-examination card.
3. supervision according to claim 2 and conjunction rule system, wherein said one or more computer processor is further configured at least one user the report of any generation to be sent to described system.
4. supervision according to claim 1 and conjunction rule system, wherein said one or more computer processor is further configured at least one user described good authentication report to be sent to described system.
5. supervision according to claim 1 and conjunction rule system, wherein said one or more computer processor is further configured the more new data of one or more parameters of multiple clients' licenses of asking termly about described storage data.
6. supervision according to claim 1 and conjunction rule system, wherein said material is at least one in controlled substance, non-control prescription and Medical Devices.
7. supervision according to claim 1 and close rule systems, wherein said client input that data comprise in following item one or more: item identifiers, medicine perform management board (DEA) Drug Code, client's permit number, client's identifier, DEA customer number, lot-size, Order Date and Shipping Address.
8. supervision according to claim 1 and conjunction rule system, wherein:
Described client input data comprise lot-size, Order Date, identification client client's identifier, identify consumer type consumer type identifier, identify that the customer-identifier of client relevant to described client and the Object Classification of recognition material type accord with; And
Described one or more processor be further configured with:
From memory query History Order, described History Order comprises the history Object Classification symbol of this Object Classification of coupling symbol, and each History Order comprises history quantity, identifies the shipment date of described order dispatch date, identifies the history client identifier of the client placed an order, identifies the historic customer identifier of the client relevant to this client and identify the history consumer type identifier of consumer type;
One or more inspection is implemented to order, each of described one or more inspection be configured to check not by time described order is identified as suspicious; And when order is marked as suspicious, the information about this order is stored and is beneficial to further investigation in memory.
9. supervision according to claim 8 and conjunction rule system, wherein said one or more inspection comprises:
(1) determine whether lot-size is greater than the first upper limit controlling value, this first upper limit controlling value derives from the history quantity of the first subgroup History Order, this the first subgroup History Order comprises the History Order with the history client identifier of mating with client's identifier, and being greater than the first upper limit controlling value for lot-size, is suspicious by this hand marker;
(2) Order Date of this order and the time period between the shipment date from the previous continuous History Order had in the History Order of the history client identifier of mating with client's identifier is calculated, determine whether lot-size is greater than the second upper limit controlling value, this second upper limit controlling value derives from the history quantity of this time period and the second subgroup History Order, this the second subgroup History Order comprises the History Order with the history client identifier of mating with client's identifier, and being greater than the second upper limit controlling value for lot-size, is suspicious by this hand marker;
(3) determine whether lot-size is greater than first threshold, this first threshold derives from the history quantity of the 3rd subgroup History Order, the History Order of the 3rd subgroup comprises the History Order with the history consumer type identifier of mating with consumer type identifier, and being greater than this first threshold for lot-size, is suspicious by this hand marker;
(4) determine whether lot-size is greater than Second Threshold, this Second Threshold derives from the history quantity of History Order, is greater than this Second Threshold for lot-size, is suspicious by this hand marker; And
(5) determine whether lot-size is greater than the 3rd threshold value, 3rd threshold value derives from the history quantity of the History Order of the 4th subgroup, the History Order of the 4th subgroup comprises the History Order with history client and the customer-identifier mated with client and customer-identifier, being greater than the 3rd threshold value for lot-size, is suspicious by this hand marker.
10. a method for computing machine execution, for the License Authentication of the order about one or more supervision materials, said method comprising the steps of:
(A) receive in one or more memory storage region and store the order data relevant to the order of the supervision material that client sends, the client that this order data comprises about the one or more parameters of one of them in multiple client's licenses of this client inputs data;
(B) go out from described one or more memory storage area reseach and store data at least partially, described storage packet supervises the relevant data of one or more parameters of license containing to multiple client;
(C) by least one computer processor, client is inputted data to compare with the institute's retrieving portion storing data, to identify one or more difference;
(D) for unidentified go out any difference, generated the good authentication report of this order by this at least one computer processor, this good authentication report approval further this order of process; With
(E) for identifying one or more difference, generated the unsuccessful authentication report of this order by this at least one computer processor, this unsuccessful authentication report stops this order of process further.
The method that 11. computing machines according to claim 10 perform, described method comprises further, before step (E):
(i) for identifying one or more difference, the more new data of the storage data that the one or more parameters being inputted client license of data by least one computer processor request described about described client are correlated with;
(ii) for more new data described in reception, by least one computer processor described, described client is inputted data and compare with described more new data, to determine whether described one or more difference still exists;
(iii) for not recognizing residual difference, by least one computer processor described for this order request generates the report of successful re-examination card, this successful re-examination card report approval this order of process further; And
(iv) for recognizing one or more residual difference, by least one computer processor described for this order request generates the report of unsuccessful re-examination card, this unsuccessful re-examination card report stops this order of process further.
The method that 12. computing machines according to claim 10 perform, wherein:
Described client input data comprise lot-size, Order Date, identification client client's identifier, identify consumer type consumer type identifier, identify that the customer-identifier of client relevant to described client and the Object Classification of recognition material type accord with; And
Described method is further comprising the steps:
By at least one computer processor described from memory query History Order, described History Order comprises the history Object Classification symbol of this Object Classification of coupling symbol, and each History Order comprises history quantity, identifies the shipment date of described order dispatch date, identifies the history client identifier of the client placed an order, identifies the historic customer identifier of the client relevant to this client and identify the history consumer type identifier of consumer type;
By at least one computer processor described, one or more inspection is implemented to order, each of described one or more inspection be configured to check not by time described order is identified as suspicious; And
When order is marked as suspicious, the information about this order is stored and is beneficial to further investigation in memory.
The method that 13. computing machines according to claim 12 perform, wherein said one or more inspection comprises:
(1) the first upper limit controlling value whether is greater than by least one computer processor determination lot-size described, this first upper limit controlling value derives from the history quantity of the first subgroup History Order, this the first subgroup History Order comprises the History Order with the history client identifier of mating with client's identifier, and being greater than the first upper limit controlling value for lot-size, is suspicious by this hand marker;
(2) Order Date of this order and the time period between the shipment date from the previous continuous History Order had in the History Order of the history client identifier of mating with client's identifier is calculated by least one computer processor described, determine whether lot-size is greater than the second upper limit controlling value, this second upper limit controlling value derives from the history quantity of this time period and the second subgroup History Order, this the second subgroup History Order comprises the History Order with the history client identifier of mating with client's identifier, and the second upper limit controlling value is greater than for lot-size, be suspicious by this hand marker,
(3) whether first threshold is greater than by least one computer processor determination lot-size described, this first threshold derives from the history quantity of the 3rd subgroup History Order, the History Order of the 3rd subgroup comprises the History Order with the history consumer type identifier of mating with consumer type identifier, and being greater than this first threshold for lot-size, is suspicious by this hand marker;
(4) whether be greater than Second Threshold by least one computer processor determination lot-size described, this Second Threshold derives from the history quantity of History Order, is greater than this Second Threshold for lot-size, is suspicious by this hand marker; And
(5) the 3rd threshold value whether is greater than by least one computer processor determination lot-size described, 3rd threshold value derives from the history quantity of the History Order of the 4th subgroup, the History Order of the 4th subgroup comprises the History Order with history client and the customer-identifier mated with client and customer-identifier, being greater than the 3rd threshold value for lot-size, is suspicious by this hand marker.
14. 1 kinds of computer programs, comprise at least one computer-readable recording medium, and described medium has computer readable program code part wherein, and described computer readable program code part comprises:
First can perform part, and for receiving the data of the associated customer license received because of supervision material order, wherein said data comprise:
About the order data of the supervision material order sent by client, the client that this order data comprises about the one or more parameters of one of them in multiple client's licenses of this client inputs data; With
Store data, this storage packet contains the data of one or more parameters of supervising license about multiple client;
Second can perform part, inputs data and stores data at least partially for comparing client, to identify one or more difference; With
3rd can perform part, for generating one or more reports based on described comparison, wherein:
For unidentified go out any difference, the described 3rd can perform the good authentication report that part is configured to generate this order, described good authentication report approval this order of process further; And
For identifying one or more difference, the described 3rd can perform the unsuccessful authentication report that part is configured to generate this order, and described unsuccessful authentication report stops this order of process further.
15. computer programs according to claim 14, described product comprises the 4th further can perform part, and the described 4th can perform part is configured to:
(i) for identifying one or more difference, the more new data of the storage data of asking the one or more parameters inputting client license of data about described client to be correlated with;
(ii) for more new data described in reception, described client is inputted data and compare with described more new data, to determine whether described one or more difference still exists;
(iii) for not recognizing residual difference, for this order request generates the report of successful re-examination card, this successful re-examination card report approval this order of process further; And
(iv) for recognizing one or more residual difference, for this order request generates the report of unsuccessful re-examination card, this unsuccessful re-examination card report stops this order of process further.
16. computer programs according to claim 14, wherein:
Described client input data comprise lot-size, Order Date, identification client client's identifier, identify consumer type consumer type identifier, identify that the customer-identifier of client relevant to described client and the Object Classification of recognition material type accord with; And
Described method is further comprising the steps:
By at least one computer processor described from memory query History Order, described History Order comprises the history Object Classification symbol of this Object Classification of coupling symbol, and each History Order comprises history quantity, identifies the shipment date of described order dispatch date, identifies the history client identifier of the client placed an order, identifies the historic customer identifier of the client relevant to this client and identify the history consumer type identifier of consumer type;
By at least one computer processor described, one or more inspection is implemented to order, each of described one or more inspection be configured to check not by time described order is identified as suspicious, described one or more inspection comprises:
(1) determine whether lot-size is greater than the first upper limit controlling value, this first upper limit controlling value derives from the history quantity of the first subgroup History Order, this the first subgroup History Order comprises the History Order with the history client identifier of mating with client's identifier, and being greater than the first upper limit controlling value for lot-size, is suspicious by this hand marker;
(2) Order Date of this order and the time period between the shipment date from the previous continuous History Order had in the History Order of the history client identifier of mating with client's identifier is calculated, determine whether lot-size is greater than the second upper limit controlling value, this second upper limit controlling value derives from the history quantity of this time period and the second subgroup History Order, this the second subgroup History Order comprises the History Order with the history client identifier of mating with client's identifier, and being greater than the second upper limit controlling value for lot-size, is suspicious by this hand marker;
(3) determine whether lot-size is greater than first threshold, this first threshold derives from the history quantity of the 3rd subgroup History Order, the History Order of the 3rd subgroup comprises the History Order with the history consumer type identifier of mating with consumer type identifier, and being greater than this first threshold for lot-size, is suspicious by this hand marker;
(4) determine whether lot-size is greater than Second Threshold, this Second Threshold derives from the history quantity of History Order, is greater than this Second Threshold for lot-size, is suspicious by this hand marker; And
(5) determine whether lot-size is greater than the 3rd threshold value, 3rd threshold value derives from the history quantity of the History Order of the 4th subgroup, the History Order of the 4th subgroup comprises the History Order with history client and the customer-identifier mated with client and customer-identifier, being greater than the 3rd threshold value for lot-size, is suspicious by this hand marker; And
When order is marked as suspicious, the information about this order is stored and is beneficial to further investigation in memory.
17. 1 kinds of supervision and conjunction rule system, for identifying the suspicious order of the supervision material received, described system comprises:
Storer; And
One or more computer processor, described one or more computer processor is configured to:
Receive supervision material order from client, described order comprise lot-size, Order Date, identify this client client's identifier, identify the consumer type identifier of consumer type and identify the Object Classification symbol of this supervision material; From memory query History Order, described History Order comprises the history Object Classification symbol of this Object Classification of coupling symbol, and each History Order comprises history quantity, identifies the shipment date of order dispatch date, identifies the history client identifier of the client placed an order and identifies the history consumer type identifier of consumer type;
Check order, described inspection comprises:
(1) determine whether lot-size is greater than the first upper limit controlling value, this first upper limit controlling value derives from the history quantity of the first subgroup History Order, this the first subgroup History Order comprises the History Order with the history client identifier of mating with client's identifier, and being greater than the first upper limit controlling value for lot-size, is suspicious by this hand marker;
(2) Order Date of this order and the time period between the shipment date from the previous continuous History Order had in the History Order of the history client identifier of mating with client's identifier is calculated, determine whether lot-size is greater than the second upper limit controlling value, this second upper limit controlling value derives from the history quantity of this time period and the second subgroup History Order, this the second subgroup History Order comprises the History Order with the history client identifier of mating with client's identifier, and being greater than the second upper limit controlling value for lot-size, is suspicious by this hand marker;
(3) determine whether lot-size is greater than first threshold, this first threshold derives from the history quantity of the 3rd subgroup History Order, the History Order of the 3rd subgroup comprises the History Order with the history consumer type identifier of mating with consumer type identifier, and being greater than this first threshold for lot-size, is suspicious by this hand marker;
(4) determine whether lot-size is greater than Second Threshold, this Second Threshold derives from the history quantity of History Order, is greater than this Second Threshold for lot-size, is suspicious by this hand marker; And
(5) determine whether lot-size is greater than the 3rd threshold value, 3rd threshold value derives from the history quantity of the History Order of the 4th subgroup, the History Order of the 4th subgroup comprises the History Order with history client and the customer-identifier mated with client and customer-identifier, being greater than the 3rd threshold value for lot-size, is suspicious by this hand marker;
And
For being marked as suspicious order, the information about this order being stored and is beneficial to further investigation in memory.
18. supervision according to claim 17 and conjunction rule system, wherein said one or more computer processor is configured to:
(A) receive the order of supervision material from client, this order comprises order data, and the client that this order data comprises the one or more parameters of one of them that the multiple clients about this client supervise in license inputs data;
(B) the storage data be at least partially included in described one or more memory storage region are retrieved;
(C) client is inputted data to compare with the part retrieved storing data, to identify one or more difference;
(D) for not recognizing difference, for described order generates good authentication report, the described good authentication report approval described order of process further; With
(E) for identifying one or more difference, for described order generates unsuccessful authentication report.
19. supervision according to claim 18 and close rule systems, wherein, for response identifies one or more difference, described one or more computer processor be further configured with:
The more new data of the storage data of asking the one or more parameters inputting client's license of data about described client to be correlated with;
For more new data described in reception, described client is inputted data and compare with described more new data, to determine whether described one or more difference still exists;
For not recognizing residual difference, for this order request generates the report of successful re-examination card; And
For recognizing one or more residual difference, for this order request generates the report of unsuccessful re-examination card.
The method that 20. 1 kinds of computing machines perform, for identifying the suspicious order of the supervision material received, said method comprising the steps of:
Receive supervision material order from client, this order comprise lot-size, Order Date, identify this client client's identifier, identify the consumer type identifier of consumer type and identify the Object Classification symbol of this supervision material;
From memory query History Order, described History Order comprises the history Object Classification symbol of this Object Classification of coupling symbol, and each History Order comprises history quantity, identifies the shipment date of dispatch date, identifies the history client identifier of the client placed an order and identifies the history consumer type identifier of consumer type;
Checked order by computer installation, described inspection comprises:
(1) whether described computer installation determination lot-size is greater than the first upper limit controlling value, this first upper limit controlling value derives from the history quantity of the first subgroup History Order, this the first subgroup History Order comprises the History Order with the history client identifier of mating with client's identifier, and being greater than the first upper limit controlling value for lot-size, is suspicious by this hand marker;
(2) described computer installation calculates the Order Date of this order and the time period between the shipment date from the previous continuous History Order had in the History Order of the history client identifier of mating with client's identifier, determine whether lot-size is greater than the second upper limit controlling value, this second upper limit controlling value derives from the history quantity of this time period and the second subgroup History Order, this the second subgroup History Order comprises the History Order with the history client identifier of mating with client's identifier, and the second upper limit controlling value is greater than for lot-size, be suspicious by this hand marker,
(3) whether described computer installation determination lot-size is greater than first threshold, this first threshold derives from the history quantity of the 3rd subgroup History Order, the History Order of the 3rd subgroup comprises the History Order with the history consumer type identifier of mating with consumer type identifier, and being greater than this first threshold for lot-size, is suspicious by this hand marker;
(4) whether described computer installation determination lot-size is greater than Second Threshold, and this Second Threshold derives from the history quantity of History Order, is greater than this Second Threshold for lot-size, is suspicious by this hand marker; And
(5) determine whether lot-size is greater than the 3rd threshold value, 3rd threshold value derives from the history quantity of the History Order of the 4th subgroup, the History Order of the 4th subgroup comprises the History Order with history client and the customer-identifier mated with client and customer-identifier, being greater than the 3rd threshold value for lot-size, is suspicious by this hand marker; And
Order is marked as suspicious, stores about the information of this order is to investigate further in memory.
The method that 21. computing machines according to claim 20 perform, described method is further comprising the steps:
(A) receive in one or more memory storage region and store the order data relevant to the order of the supervision material that client sends, the client that this order data comprises about the one or more parameters of one of them in multiple client's licenses of this client inputs data;
(B) go out from described one or more memory storage area reseach and store data at least partially, described storage packet supervises the relevant data of one or more parameters of license containing to multiple client;
(C) by least one computer processor, client is inputted data to compare with the institute's retrieving portion storing data, to identify one or more difference;
(D) for unidentified go out any difference, generated the good authentication report of this order by this at least one computer processor, this good authentication report approval further this order of process; With
(E) for identifying one or more difference, generated the unsuccessful authentication report of this order by this at least one computer processor, this unsuccessful authentication report stops this order of process further.
The method that 22. computing machines according to claim 21 perform, described method comprises further, before step (E):
(i) for identifying one or more difference, the more new data of the storage data that the one or more parameters being inputted client license of data by least one computer processor request described about described client are correlated with;
(ii) for more new data described in reception, by least one computer processor described, described client is inputted data and compare with described more new data, to determine whether described one or more difference still exists;
(iii) for not recognizing residual difference, by least one computer processor described for this order request generates the report of successful re-examination card, this successful re-examination card report approval this order of process further; And
(iv) for recognizing one or more residual difference, by least one computer processor described for this order request generates the report of unsuccessful re-examination card, this unsuccessful re-examination card report stops this order of process further.
23. 1 kinds of computer programs, comprise at least one computer-readable recording medium, and this medium has computer readable program code part wherein, and described computer readable program code part comprises:
First can perform part, for receiving supervision material order from client, this order comprise lot-size, Order Date, identify this client client's identifier, identify the consumer type identifier of consumer type and identify the Object Classification symbol of this supervision material;
Second can perform part, be contained in the History Order of the history Object Classification symbol of Object Classification symbol coupling for inquiry packet, each History Order comprises history quantity, identifies the shipment date of dispatch date, identifies the history client identifier of the client placed an order and identifies the history consumer type identifier of consumer type;
3rd can perform part, and for checking order, described inspection comprises:
(1) determine whether lot-size is greater than the first upper limit controlling value, this first upper limit controlling value derives from the history quantity of the first subgroup History Order, this the first subgroup History Order comprises the History Order with the history client identifier of mating with client's identifier, and being greater than the first upper limit controlling value for lot-size, is suspicious by this hand marker;
(2) Order Date of this order and the time period between the shipment date from the previous continuous History Order had in the History Order of the history client identifier of mating with client's identifier is calculated, determine whether lot-size is greater than the second upper limit controlling value, this second upper limit controlling value derives from the history quantity of this time period and the second subgroup History Order, this the second subgroup History Order comprises the History Order with the history client identifier of mating with client's identifier, and being greater than the second upper limit controlling value for lot-size, is suspicious by this hand marker;
(3) determine whether lot-size is greater than first threshold, this first threshold derives from the history quantity of the 3rd subgroup History Order, the History Order of the 3rd subgroup comprises the History Order with the history consumer type identifier of mating with consumer type identifier, and being greater than this first threshold for lot-size, is suspicious by this hand marker;
(4) determine whether lot-size is greater than Second Threshold, this Second Threshold derives from the history quantity of History Order, is greater than this Second Threshold for lot-size, is suspicious by this hand marker; And
(5) determine whether lot-size is greater than the 3rd threshold value, 3rd threshold value derives from the history quantity of the History Order of the 4th subgroup, the History Order of the 4th subgroup comprises the History Order with history client and the customer-identifier mated with client and customer-identifier, being greater than the 3rd threshold value for lot-size, is suspicious by this hand marker; And
4th can perform part, is marked as suspicious for order, stores about the information of this order is to investigate further in memory.
24. computer programs according to claim 23, described product comprises further:
4th can perform part, is configured to compare client and inputs data and store data at least partially, to identify one or more difference; And
5th can perform part, is configured to generate one or more reports based on described comparison, wherein:
For unidentified go out any difference, the described 5th can perform the good authentication report that part is configured to generate this order, described good authentication report approval this order of process further; And
For identifying one or more difference, the described 5th can perform the unsuccessful authentication report that part is configured to generate this order, and described unsuccessful authentication report stops this order of process further.
25. computer programs according to claim 24, described product comprises the 6th further can perform part, and the described 6th can perform part is configured to:
(i) for identifying one or more difference, the more new data of the storage data of asking the one or more parameters inputting client license of data about described client to be correlated with;
(ii) for more new data described in reception, described client is inputted data and compare with described more new data, to determine whether described one or more difference still exists;
(iii) for not recognizing residual difference, for this order request generates the report of successful re-examination card, this successful re-examination card report approval this order of process further; And
(iv) for recognizing one or more residual difference, for this order request generates the report of unsuccessful re-examination card, this unsuccessful re-examination card report stops this order of process further.
CN201280060673.5A 2011-12-08 2012-12-07 System and method for supporting regulatory requirements for controlled and non-controlled distribution of items Active CN104364816B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201161568229P 2011-12-08 2011-12-08
US61/568229 2011-12-08
PCT/US2012/068468 WO2013086335A1 (en) 2011-12-08 2012-12-07 Systems and methods for supporting regulatory requirements for the distribution of controlled and non-controlled items

Publications (2)

Publication Number Publication Date
CN104364816A true CN104364816A (en) 2015-02-18
CN104364816B CN104364816B (en) 2021-06-15

Family

ID=47472037

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201280060673.5A Active CN104364816B (en) 2011-12-08 2012-12-07 System and method for supporting regulatory requirements for controlled and non-controlled distribution of items

Country Status (5)

Country Link
US (4) US8983869B2 (en)
EP (1) EP2788949A4 (en)
CN (1) CN104364816B (en)
CA (1) CA2842430C (en)
WO (1) WO2013086335A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104836701A (en) * 2015-05-04 2015-08-12 北京京东尚科信息技术有限公司 Order monitoring method and monitoring apparatus
US20210158413A1 (en) * 2019-11-25 2021-05-27 Breckenridge Capital Llc System and method for automating electronic pharmaceutical transactions

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8983869B2 (en) 2011-12-08 2015-03-17 United Parcel Service Of America, Inc. Systems and methods for supporting regulatory requirements for the distribution of controlled and non-controlled items
US10430555B1 (en) 2014-03-13 2019-10-01 Mckesson Corporation Systems and methods for determining and communicating information to a pharmacy indicating patient eligibility for an intervention service
DE112014006705T5 (en) * 2014-05-28 2017-02-16 Fujitsu Limited Ordering program, ordering device and ordering procedure
US10642957B1 (en) 2014-10-21 2020-05-05 Mckesson Corporation Systems and methods for determining, collecting, and configuring patient intervention screening information from a pharmacy
CN104361443B (en) * 2014-11-06 2016-03-30 李华 A kind of electronic system of signature card and the disposal route of signature card information
CN105279688A (en) * 2015-10-23 2016-01-27 上海钢富电子商务有限公司 Order form data processing method and system
US11094011B2 (en) * 2017-01-25 2021-08-17 Fidessa Trading Uk Limited Actionable contextualized alerts within an order management system
US10650380B1 (en) 2017-03-31 2020-05-12 Mckesson Corporation System and method for evaluating requests
JP7107145B2 (en) * 2018-09-28 2022-07-27 ブラザー工業株式会社 IMAGE FORMING APPARATUS, AND METHOD AND PROGRAM FOR ORDERING CONSUMABLES IN IMAGE FORMING APPARATUS
US11551233B1 (en) * 2020-01-27 2023-01-10 Pizza Hut Connect, LLC System and method for governing execution of a geography dependent computer process
US20220398586A1 (en) * 2021-06-09 2022-12-15 WARPSPEED, Inc. Transaction compliance determination using machine learning

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1545668A (en) * 2001-07-05 2004-11-10 却克波特特许公司 Transaction processing system and method
US20070106617A1 (en) * 2005-11-08 2007-05-10 Paul Mabray Legal compliance system for the sale of regulated products or services
US20110238593A1 (en) * 2010-03-23 2011-09-29 United Parcel Service Of America, Inc. Systems and Methods for Identifying Suspicious Orders

Family Cites Families (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020120573A1 (en) * 1998-11-03 2002-08-29 Mccormick Douglas Secure extranet operation with open access for qualified medical professional
CA2330266C (en) * 2000-01-05 2006-04-11 Procure.Com Inc. Secure electronic procurement system and method
US6658394B1 (en) * 2000-08-08 2003-12-02 Squaretrade, Inc. Electronic seals
US6952681B2 (en) * 2000-09-07 2005-10-04 Data Reduction Systems Corp. Tracking the distribution of prescription drugs and other controlled articles
US7640170B1 (en) * 2000-11-10 2009-12-29 Ewing B. Gourley Method and apparatus for processing pharmaceutical orders to determine whether a buyer of pharmaceuticals qualifies for an “own use” discount
US20030093295A1 (en) * 2001-11-14 2003-05-15 Lilly Ralph B. Controlled substance tracking system and method
US7680696B1 (en) * 2002-01-12 2010-03-16 Murray Thomas G Computer processing system for facilitating the order, purchase, and delivery of products
US7321972B2 (en) * 2002-02-01 2008-01-22 Novell, Inc. Isolating multiple authentication channels, each using multiple authentication models
EP1770954A1 (en) * 2005-10-03 2007-04-04 Amadeus S.A.S. System and method to maintain coherence of cache contents in a multi-tier software system aimed at interfacing large databases
WO2007101261A2 (en) * 2006-02-28 2007-09-07 Ici Worldwide, Inc. Merchandise tracking and ordering system
US20080004966A1 (en) * 2006-06-30 2008-01-03 Singleton Shaun W System and method for control and monitor of sales transactions
CA2572649C (en) * 2006-12-29 2017-01-24 Bce Inc Method and apparatus for wireless management of articles
US8429734B2 (en) * 2007-07-31 2013-04-23 Symantec Corporation Method for detecting DNS redirects or fraudulent local certificates for SSL sites in pharming/phishing schemes by remote validation and using a credential manager and recorded certificate attributes
CA2715969C (en) * 2008-02-12 2013-12-10 Bio-Tech Medical Software, Inc. System and method for monitoring medication prescriptions using biometric identification and verification
US8335697B2 (en) * 2008-02-12 2012-12-18 Bio-Tech Medical Software, Inc. System and method for monitoring medication prescriptions using biometric identification and verification
US8429018B2 (en) 2008-07-29 2013-04-23 W.W. Grainger, Inc. System and method for detecting a possible error in a customer provided product order quantity
US8656162B2 (en) * 2009-10-22 2014-02-18 Honeywell International Inc. Aeronautical security management over broadband air/ground network
US8566189B2 (en) * 2010-02-10 2013-10-22 Strategic Pharmaceutical Solutions, Inc. Computer-enabled method and system for facilitating veterinary pharmaceutical and other animal-related product transactions
US20110218928A1 (en) * 2010-03-02 2011-09-08 Thorsten Refior Automated license determination
WO2012011997A1 (en) * 2010-04-27 2012-01-26 The Travelers Companies, Inc. System and method for detecting drug fraud and abuse
WO2012045182A1 (en) 2010-10-05 2012-04-12 Die Schweizerische Post Method of tracking a location of transported goods
US8548839B2 (en) * 2010-11-12 2013-10-01 Healthcare Volunteer, Inc. System and method for facilitating healthcare volunteering
US20120150561A1 (en) * 2010-12-09 2012-06-14 Sean Carroll Prescription Verification System
US8983869B2 (en) 2011-12-08 2015-03-17 United Parcel Service Of America, Inc. Systems and methods for supporting regulatory requirements for the distribution of controlled and non-controlled items

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1545668A (en) * 2001-07-05 2004-11-10 却克波特特许公司 Transaction processing system and method
US20070106617A1 (en) * 2005-11-08 2007-05-10 Paul Mabray Legal compliance system for the sale of regulated products or services
US20110238593A1 (en) * 2010-03-23 2011-09-29 United Parcel Service Of America, Inc. Systems and Methods for Identifying Suspicious Orders

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104836701A (en) * 2015-05-04 2015-08-12 北京京东尚科信息技术有限公司 Order monitoring method and monitoring apparatus
US20210158413A1 (en) * 2019-11-25 2021-05-27 Breckenridge Capital Llc System and method for automating electronic pharmaceutical transactions
US11983749B2 (en) * 2019-11-25 2024-05-14 Breckenridge Capital Llc System and method for automating electronic pharmaceutical transactions

Also Published As

Publication number Publication date
US8983869B2 (en) 2015-03-17
WO2013086335A1 (en) 2013-06-13
US20200394692A1 (en) 2020-12-17
US20230169556A1 (en) 2023-06-01
US11587135B2 (en) 2023-02-21
US20150154673A1 (en) 2015-06-04
EP2788949A4 (en) 2015-07-08
CA2842430C (en) 2014-12-23
CA2842430A1 (en) 2013-06-13
EP2788949A1 (en) 2014-10-15
CN104364816B (en) 2021-06-15
US20130151373A1 (en) 2013-06-13
US10769689B2 (en) 2020-09-08

Similar Documents

Publication Publication Date Title
CN104364816A (en) Systems and methods for supporting regulatory requirements for the distribution of controlled and non-controlled items
CN102812457B (en) Systems And Methods For Identifying Suspicious Orders
CN111178219A (en) Bill identification management method and device, storage medium and electronic equipment
RU2273880C2 (en) Communication system of expanded order based on internet and method for realization of the same
CN102947819A (en) Information tracking system and method
CN110851298B (en) Abnormality analysis and processing method, electronic device and storage medium
CN111028072A (en) Supply chain financial pre-loan tone data processing method and system
US20200099621A1 (en) Sensing device management apparatus
CN114493335A (en) System for product quality tracing
US11102311B2 (en) Registration during downtime
RU75083U1 (en) SYSTEM OF CONTROL AND ACCOUNTING OF AUTHENTICITY OF DOCUMENTS
US10650380B1 (en) System and method for evaluating requests
KR20080053751A (en) Materials managing method and materials managing system
US7007841B2 (en) Systems and methods for tracking tobacco packages
CA3055579C (en) Method, apparatus and computer program product for identifying potential drug misuse
Ismail et al. Comprehensive Evolution of Pharmaceutical Industries by Pioneering Blockchain Technology with 6G Wireless Networks Amalgamation
CN114761955A (en) Information processing apparatus, information processing method, and information processing program
Zayd et al. Supply Chain Management Using Blockchain and IoT in Pharmaceutical Industries
David et al. Measuring Performance Metrics for Blockchain-Based Land Registration Systems: A Mathematical Model Approach
Vikaliana Tracking and Tracing Technology in Upholding Halal Product Integrity: Case in Indonesia
US10037505B2 (en) System and method for processing and dynamically segregating business assets
Dewi et al. Development of Integrated Library System: A Case Study of TRAMPIL Foundation‘s Learning Center
CN117172700A (en) Real estate asset supervision method, system and medium
CN114416572A (en) Form testing method and device, computer equipment and storage medium
CN114328593A (en) Address data processing method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant